David Leporini

David Leporini was the Executive Vice President of Marketing, Products and Security of Viaccess-Orca. Prior to this role, David was a member of the Executive Board of Viaccess and served as CTO since 2007 and was head of system architecture, specifications, security and innovation. Prior to service as CTO, David was head of security for Viaccess since 2005. Before joining Viaccess, David was Operations Manager for Trusted Logic and was responsible for security consultancy activities and quality management. David holds a Doctorat degree with highest honours from the Université Paris-Sud.

Recent Posts

Digital Rights Management (DRM), viewed as the set of technologies enforcing license agreements, has been an integral part of the history of digital content since very early days. Its use stretches all the way back into the 1990s and comparatively primitive techniques such as Product Keys, which saw users enter — often repeatedly — long strings of random numbers to validate computer programs like games. Efforts to break such protection technologies have been around for almost as long, as witnessed by the landmark and unanimous passing of The Digital Millennium Copyright Act by the US Senate in 1998. This made it an offence to circumvent access controls and technical protection measures applied to copyrighted works, and thus the struggle against digital piracy became a matter for the criminal courts as well as the copyright holders.

An increasing number of companies are interested in cloud environments in order to improve their computing, storage and networking efficiency, adaptability, and to reduce their capital expenditures. By leveraging the cloud properties of elastic and on-demand access to computing resources (eg networks, servers, storage, applications and services), companies do not need to own and maintain any more dedicated servers. Cloud service providers can provide management of various tasks like mailing and other collaborative tools.

T. S. Eliot wrote: "Immature poets imitate; mature poets steal; bad poets deface what they take, and good poets make it into something better, or at least something different. The good poet welds his theft into a whole of feeling which is unique, utterly different from that from which it was torn."

"6. 20 Am. Waking up. Didn’t sleep much, as usual in the last year. First shot of Ristretto while checking up the figures of my FaMe app. Still amazed no one understood the “Fake Me” contraction trick by now.

There is a famous saying in enterprise security nowadays – either you have been hacked and you do not want to admit it, or you are simply not aware you have been. If you believe this only results from massive government intelligence programmes and solely concerns big corporations of strategic relevance, then you should take note of the following: companies like Evernote and Feedly recently suffered from severe service outages, and software- hosting provider Code Spaces even went out of business after targeted Distributed Denial of Service (DDoS) attacks on their cloud infrastructures.

It looks like a shark fin – a sudden, abrupt and massive technology adoption, followed by a rapid decline upon the arrival of a new disruptive technology wave. In Big Bang Disruption, Downes and Nunes turn Roger’s classic bell curve of technology demand model on its head, now taking the form of a threatening dorsal.

Yesterday was a good time for enterprise security practitioners. Back then it was enough to install a device to protect a building, and that was it. Unfortunately, such good times are gone. In fact, we should have started having doubts several years ago, when firewalls seemed to be ineffective against new threats. Why? Three reasons:

The past five years have witnessed a marked shift in concerns about Pay-TV piracy. Piracy efforts in the broadcast world primarily have taken the form of subscription sharing using Pay-TV smartcards, which provided keys for decrypting content onto specific channels that weren't meant to be accessed by non-subscribers. This type of piracy is referred to as card sharing and Control Word sharing in DVB lingo.

It’s that time of year again! The industry and all its enthusiasts have been prepping and waiting for IBC 2013, to get updated with the hottest technology, trends and interesting upcoming innovations and it’s finally just around the corner. IBC 2012 proved to be nothing short of a great success and we are eager to witness the excitement sure to unfold at IBC 2013.

Most OTT content viewers, especially those who appreciate the glitter and novelty of newly purchased smart mobile devices, are enthused by the variety and quality of available OTT content possibilities. Big players, including content service providers, content owners and copyright holders, being well aware of this, continue to promote more content that their viewers can enjoy on any device. However, every good story has its bad side, and with OTT there is no doubt it is content piracy.